Mow should an administrator overcome the backup failure issue?
A Netbackup environment suffers from intermittent network outages between the Media Server Drduplication Pool (MSOP) media server and clients during the backup window. This results in multiple backup failures. Mow should an administrator overcome the backup failure issue?A . enable Network ResiliencyB . configure client-side deduplicationC . increase the client...
Where can firewall rules be applied on the NSX Edge Services Gateway?
Where can firewall rules be applied on the NSX Edge Services Gateway?A . Rules can be applied on the uplink interface only.B . Rules can be applied on either the uplink interface or internal interface.C . Rules can be on either the uplink, internal, or management interfaces.D . Rules can...
Which tool should you use?
You have a server named Server1 that runs Windows Server 2012 R2. When you install a custom Application on Server1 and restart the server, you receive the following error message: "The Boot Configuration Data file is missing some required information. File: BootBCD Error code: 0x0000034." You start Server1 by using...
Which of the below characteristics of RPL is true?
Which of the below characteristics of RPL is true?A . RPL is designed for lossy networks.B . RPL is an IPv6 link-state routing protocol.C . RPL can send only messages in secured mode.D . RPL uses hello messages to send routing updates to its neighbors.View AnswerAnswer: A Explanation: From: http://www.openmote.com/standards/ietf-rpl.html...
Which statement about SPAN are true?
Which statement about SPAN are true?A . It is an industry-standard protocol for mirroring traffic.B . SPAN destinations participate in spanning-tree instances.C . It uses a specific VLAN to transfer mirrored traffic.D . It mirrors traffic from a source port to a destination port on the same switch only.E ....
Which three permissions would the user be able to perform?
A user is given the “Virtual machine user (sample)” role in a vSphere 6.x environment. Which three permissions would the user be able to perform? (Choose three.)A . Reset a virtual machine.B . Power on a virtual machine.C . Move a host into a cluster.D . Configure CD media.E ....
What should you configure?
Your network contains an Active Directory domain named contoso.com. The domain contains two member servers named Server1 and Server2. All servers run Windows Server 2012 R2. Server1 and Server2 have the Failover Clustering feature installed. The servers are configured as nodes in a failover cluster named Cluster1. You add two...
Which two protocols enable Cisco Configuration Professional to pull IPS alerts from a Cisco ISR router? (Choose two.)
Which two protocols enable Cisco Configuration Professional to pull IPS alerts from a Cisco ISR router? (Choose two.)A . syslogB . SDEEC . FTPD . TFTPE . SSHF . HTTPSView AnswerAnswer: B, F Explanation: http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6634/prod_white_paper0900aecd805c4ea8.html Step 4: Enabling IOS IPS The fourth step is to configure IOS IPS using the...
Which two statements about MPLS label-switched paths (LSPs) are true? (Choose two.)
Which two statements about MPLS label-switched paths (LSPs) are true? (Choose two.)A . LSPs are bidirectional.B . LSPs are unidirectional.C . LSPs must follow the IGP's shortest path.D . LSPs can follow paths other than the IGP's shortest path.View AnswerAnswer: B, D
A network engineer wants to deploy user-based authentication across the company's wired and wireless infrastructure at layer 2 of the OSI model. Company policies require that users be centrally managed and authenticated and that each user's network access be controlled based on the user's role within the company. Additionally, the central authentication system must support hierarchical trust and the ability to natively authenticate mobile devices and workstations. Which of the following are needed to implement these requirements? (Select TWO).
A network engineer wants to deploy user-based authentication across the company's wired and wireless infrastructure at layer 2 of the OSI model. Company policies require that users be centrally managed and authenticated and that each user's network access be controlled based on the user's role within the company. Additionally, the...